From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

NVision-PA: A Tool for Visual Analysis of Command Behavior Based on Process Accounting Logs (with a Case Study in HPC Cluster Security), и . CoRR, (2006)Multiple design patterns for voice over IP (VoIP) security., , , , и . IPCCC, IEEE, (2006)Tamper-resistant storage techniques for multimedia systems., , , и . Storage and Retrieval Methods and Applications for Multimedia, том 5682 из SPIE Proceedings, стр. 30-40. SPIE, (2005)SCRUB-tcpdump: A multi-level packet anonymizer demonstrating privacy/analysis tradeoffs., , , , и . SecureComm, стр. 49-56. IEEE, (2007)The SCRUB security data sharing infrastructure., , , , и . NOMS, стр. 630-644. IEEE, (2008)NVision-PA: A Process Accounting Analysis Tool with a Security Focus on Masquerade Detection in HPC Clusters., и . CLUSTER, IEEE Computer Society, (2006)Providing guaranteed assurance to connection-oriented group communications using disjoint routing., и . HASE, стр. 197-198. IEEE Computer Society, (2000)A first step toward detecting SSH identity theft in HPC cluster environments: discriminating masqueraders based on command behavior., и . CCGRID, стр. 111-120. IEEE Computer Society, (2005)Making Quantitative Measurements of Privacy/Analysis Tradeoffs Inherent to Packet Trace Anonymization., , , , и . Financial Cryptography, том 5143 из Lecture Notes in Computer Science, стр. 323-324. Springer, (2008)Internet hack back: counter attacks as self-defense or vigilantism?, , и . ISTAS, стр. 380-386. IEEE, (2002)